A method and system for performing a task requiring a plurality of sequential decision-making operations by an autonomous agent are disclosed. The method includes acquiring a portion of offline data from a database, and discovering a set of separate skills. The method further includes segmenting the offline data and segmenting the offline data according to skill, and abstracting the segmented offline data into reusable functions. From the abstracted reusable functions, distilling primitives for each skill and distilling reusable tips in various functions. Modifying skill based text-based and code-based policies for augmenting the autonomous agent, and processing a task requiring a set of sequential decision-making operations using the augmented autonomous agents.
The techniques described herein relate to a method including: retrieving a subset of data files from an original dataset, wherein data files not included in the subset of data files are a remaining dataset; dividing the subset of data files into an initial training dataset and a validation dataset; executing an in initial training pass on a machine learning model, wherein the initial pass trains the model using the initial training dataset; determining, after the initial pass, a predictive accuracy of the model using the remaining dataset; determining, by a targeted sampling process, a number of least learned data files from the remaining dataset; generating a second training dataset including the number of least learned data files; and executing a second pass on the model, wherein the second pass trains the machine learning model using the second training dataset.
A method may include a first verifier computer program receiving an interaction with a first prover computer program for a client that requires verification comprising an identifier for the client; generating a challenge using a public identification key; issuing the challenge to the first prover computer program and to a second prover computer program; receiving a first response from the first prover computer program and a second response from the second prover computer program; determining that the first response and the second response were received within a predetermined amount of time; determining the first response and the second response are consistent; and informing the first prover computer program that the verification was successful.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
4.
SYSTEMS AND METHODS FOR IDENTIFYING AND REMEDIATING ARCHITECTURE DESIGN DEFECTS
Systems and methods for identifying and remediating architecture design defects are disclosed. In one aspect, a method includes generating a new architecture graph pattern based on an architecture design document of an evaluated architecture; determining a model graph pattern, wherein a shape of the model graph pattern is similar to a shape of the architecture graph pattern; determining, based on a comparison of the shape of the model graph pattern with the shape of the new architecture graph pattern, that the new architecture graph pattern includes a design defect; generating, based on the shape of the model graph pattern, a remediated graph pattern; and determining, based on the differences between the remediated graph pattern and the new architecture graph pattern, a suggested remedial change to the architecture design document.
Systems and methods for reconciling software release scope requirements are disclosed. A method may include: identifying code release version for a release candidate codebase; retrieving a log of changes made to the release candidate codebase and an implemented requirements identifier for each change; retrieving planned requirements identifiers for the code release version from a code requirements database; comparing the implemented requirements identifiers and the planned requirements identifiers; determining, based on the comparison, that an out-of-scope code change is included in the code release version; reverting the code release version to a prior version of the release candidate codebase that does not include the out-of-scope code change; retaining or reapplying in-scope code changes for the planned requirement identifiers to the prior version of the release candidate codebase; and deploying the prior version of the release candidate codebase with the in-scope changes to a production environment.
In some aspects, the techniques described herein relate to a method including: receiving, as input to a binary search process, a subject vector embedding and a class vector embedding, wherein the subject vector embedding is generated from a plurality of subject text strings and wherein the class vector embedding is generated from a class text string; generating a similarity score; determining that the similarity score is below a threshold value; splitting the plurality of subject text strings into a first new plurality of subject text strings and a second new plurality of subject text strings; receiving a new subject vector embedding, wherein the new subject vector embedding is generated from the first new plurality of subject text strings; and calling the binary search process recursively using the new subject vector embedding and the class vector embedding as input to the binary search process.
Aspects of the subject disclosure may be directed to, for example, a method including receiving a first text input that represents entity description at an entity encoder, receiving a second text input that represents Automatic Speech Recognition (ASR) transcription at a text encoder, receiving a third text input that represents ground truth transcription at the text encoder, performing embeddings of the first text input, the second text input, and the third text input, training a natural language processing model, and generating a predicted entity output and a predicted non-entity output using the trained natural language processing model. Other embodiments are disclosed.
Various methods, apparatuses, systems, and media for implementing an application programming interface (API) integration library are disclosed. A receiver receives a user request of a process flow to access one or more resources. A processor creates a configuration file having a reusable and standardized format, wherein the configuration file includes detail data that specifies how the API connects to the one or more resources to execute the user request, how to create a standardized request, how to map a standardized response back in response to the user request, and how to handle retry attempts when the user request fails. The processor also causes a library to receive the configuration file as input that utilizes the configuration file to process the user request. The processor automatically creates, by the library, a desired application as output of the process flow based on the received configuration file.
A method for using a privacy preserving linear optimization technique to perform computations on encrypted data while ensuring that the original data remains confidential and secure from any unauthorized access based on secure multi-party computation is provided. The method includes: receiving, from each of several entities, a respective input that includes encrypted data; constructing a table that includes first information that relates to an objective function, second information that relates to a boundary value, and third information that relates to a polynomial function that is applicable to each respective input; and determining a value that maximizes the polynomial function subject to a constraint that a result of applying the objective function to the value is less than or equal to the boundary value.
Method and systems for obtaining direct feedback from a payment card by using energy received from a radio frequency identification (RFID) card reader is provided. The method is implemented by a processor that is embedded in the payment card. The method includes: receiving, from the RFID card reader, a radio frequency (RF) signal that relates to a proposed transaction; transmitting, to the RFID card reader, account information that relates to the proposed transaction; and causing an actuator that is embedded in the payment card to actuate a feedback action based on the RF signal. The actuator may include a haptic device that generates a vibration that is detectable by a touch of a user of the payment card.
G06K 7/10 - Methods or arrangements for sensing record carriers by electromagnetic radiation, e.g. optical sensingMethods or arrangements for sensing record carriers by corpuscular radiation
Automated evaluation and improvement of code quality is disclosed. A method may include: receiving code to optimize; evaluating the code for a plurality of code quality dimensions using a LLM, wherein the LLM returns a code quality score and a qualitative summary for each code quality dimension; generating an overall code quality score based on the code quality score and the qualitative summary; improving the code using the LLM based on the code quality score and the qualitative summary for each code quality dimension; evaluating the improved code for the plurality of code quality dimensions using the wherein the LLM returns an updated code quality score and an updated qualitative summary; generating an overall code quality score based on the updated code quality score and the updated qualitative summary; and outputting the improved code in response to the updated code quality score being higher than the overall code quality score.
In some aspects, the techniques described herein relate to a method including: determining an optimal code block from a plurality of code blocks, wherein the plurality of code blocks each solve a predetermined problem, and wherein the optimal code block optimizes a coding efficiency; pairing the optimal code block with suboptimal code blocks from the plurality of code blocks, wherein the pairing generates suboptimal-to-optimal code pairs; training a machine learning model with the suboptimal-to-optimal code pairs, wherein the training fine-tunes the machine learning model for inferring edits to input code blocks, and wherein the edits to the input code blocks optimize the input code blocks in terms of the coding efficiency; receiving, at the machine learning model, an input code block; inferring, by the machine learning model, edits to the input code block; and outputting, by the machine learning model, an optimized code block based on the input code block.
Systems and methods for quantum-safe key infrastructures are disclosed. A method may include: (1) generating, by a first symmetric key device at a first location with a second symmetric key device at a second location, and over a symmetric key distribution channel, a symmetric key; (2) receiving, by a first encryptor at the first location, data from a first server or application; (3) encrypting, by the first encryptor, the data using the symmetric key; (4) communicating, by the first encryptor, the encrypted data to a second encryptor at the second location over a quantum-safe communication channel; (5) receiving, by the second encryptor, the symmetric key from the second symmetric key device; (6) decrypting, by the second encryptor, the encrypted data with the symmetric key; and (7) providing, by the second encryptor, the data to a second server or application.
A method and system for tracing data streamed across differing different system platforms are disclosed. The method includes providing and storing context data corresponding to a data event published to a streaming service, extracting a data classifier block from the stored context data, and extracting a lineage tracer block from the stored context data. The method further includes converting the lineage tracer block into a linked lineage triple, and generating a lineage graph using the linked lineage triple for visualization.
A system is provided for implementing a document image transformation tool that transforms an image of at least one physical document into digestible data. The system stores instructions that cause a processor to: generate a first template definition of a first type of document; transform, based on the template definition, the image of the at least one physical document into a transformed image of the at least one physical document; produce, based on the template definition, input data from the transformed image of the at least one physical document; compute, based on the transforming and the producing, analytics that identify at least one parameter of a result of the transforming and the producing; associate, via an association, the input data with the analytics; and digest at least one from among the input data, the analytics, and the association.
A method for automating roadmap software content creation is provided. The method may include gathering data, by at least one processor, from one or more data sources; filtering, by the at least one processor, the data based on a predetermined criteria to identify one or more requests to update a software application being unsupported by an external cloud environment; and creating content automatically for a roadmap software tool, based on the one or more requests, by using a content generating workflow software tool.
A method and a system for automating a process of generating a recipe for software code maintenance by recommending sub-recipes that are needed to write a new recipe are provided. The method includes: receiving a first user input that includes information that relates to the new recipe, such as a recipe name and a recipe description; analyzing the information that relates to the new recipe in order to automatically determine a list of sub-recipes for possible inclusion in the new recipe and a corresponding set of scores that indicate a probability that each sub-recipe is suitable for inclusion in the new recipe; transmitting, to the user, the list and a request for user feedback; and receiving a second user input that includes a set of selected sub-recipes to be included in the new recipe.
Systems and methods for proactively monitoring the inherent cyber-tech risk of software and hardware components are disclosed. In one embodiment, a method for proactively monitoring a cyber risk of a computer program may include: (1) receiving, by a product/version risk assessment computer program executed by an electronic device and from a user computer program executed by a use electronic device, an identification of a plurality of proposed components to include in the computer program; (2) retrieving, by the product/version risk assessment computer program, vulnerability information for each of the plurality of proposed components, wherein the vulnerability information identifies a security vulnerability for the proposed component; (3) generating, by a product/version risk scoring computer program, a risk score for the computer program under development based on the vulnerability information; and (4) returning, by the vulnerability assessment computer program, the risk score to the user computer program.
Systems and methods for check image deposit are disclosed. In one embodiment, a method for bulk check image deposit may include: (1) capturing, by a computer application executed by an electronic device, a plurality of check images for a plurality of checks comprising an image of a first side of each check and an image of a second side of each check; (2) submitting, by the computer application, the plurality of check images to a backend in a deposit transaction; (3) matching, by a check recognition computer program at the backend, the images of the first side of the checks with the images of the second sides of the checks; (4) validating, by a deposit service computer program executed by the backend, the matched images for each of the checks; and (5) depositing, by the deposit service computer program, the validated checks.
36 - Financial, insurance and real estate services
Goods & Services
Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services
09 - Scientific and electric apparatus and instruments
42 - Scientific, technological and industrial services, research and design
Goods & Services
Downloadable computer software for use in analyzing the performance of fixed income securities portfolios and for providing information about fixed income securities portfolios Non-downloadable software for use in analyzing the performance of fixed income securities portfolios and for providing information about fixed income securities portfolios
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable software; downloadable financial software; downloadable software, namely virtual currency, digital currency, digital tokens of value, and cryptocurrency; computer programs relating to financial matters; computer software platforms for financial and currency exchange; computer application software for blockchain based platforms; computer software for use in connection with digital currency and cryptocurrency; computer software and computer hardware for use as a cryptocurrency wallet; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable computer software for the handling of financial transactions; Downloadable computer programs for managing, verifying, initiating, receiving, and holding transactions and digital assets in financial matters; Downloadable financial exchange software; Downloadable currency exchange software; Downloadable currency trading software; Downloadable software for financial trading; Downloadable computer software for managing, initiating, receiving, and holding digital currency; Downloadable software for managing, initiating, receiving, and holding cryptocurrency; Downloadable software for the purchase, sale, trade, payment, clearing, and deposit of tokens of value.
24.
SYSTEMS AND METHODS FOR PAYMENT TOKEN PROVISIONING WITH VARIABLE RISK EVALUATION
Systems and methods for payment token provisioning with variable risk evaluation are disclosed. In one embodiment, a method may include: an issuer backend: (1) receiving, from an electronic wallet application, a payload comprising an identification of a card to be provisioned to the mobile electronic device; (2) determining that the card is eligible for provisioning to the mobile electronic device; (3) generating a card payload and communicating the card payload to the payment network, wherein the payment network creates a payment token for the card comprising payment token origin information; (4) receiving the payment token from the payment network and generating a risk profile for the payment token; and (5) activating the payment token in response to the validation.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06F 16/955 - Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
36 - Financial, insurance and real estate services
Goods & Services
(1) Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Financial affairs and monetary affairs, namely, financial information, management and analysis services; Financial advisory services rendered using artificial intelligence (AI); information, advisory, consultancy and financial research services relating to finance and investments; investment advisory services; financial analysis and consultation; investment consultation in the fields of securities investing and asset management; providing financial services with respect to securities and other financial instruments and products, namely, trading of and investments in securities and financial instruments and products for others; financial information provided by electronic means; providing information and research in the field of finance and financial investments; Financial data analysis; Financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes. Providing on-line non-downloadable software using artificial intelligence (AI) for use in asset management; Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) for investment portfolio management; Providing temporary use of online, non-downloadable cloud computing software using artificial intelligence (AI) for use in selecting financial securities and financial assets; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for investment insights, portfolio management, and trading; Artificial intelligence as a service (AIAAS) featuring software using artificial intelligence (AI) for analyzing data and interacting with humans; Platform as a service (PAAS) services featuring computer software platforms use of artificial intelligence for natural language processing using generative pre-trained transformer (GPT) models in the field of financial services; Platform as a service (PAAS) featuring computer software platforms for analyzing and selecting securities tailored to customer; Platform as a service (PAAS) featuring computer software platforms for use in financial and monetary affairs; Platform as a service (PAAS) featuring computer software platforms for use in financial information, advisory, analysis, consultancy, research, and management; Platform as a service (PAAS) featuring computer software platforms for asset and portfolio management; Platform as a service (PAAS) featuring computer software platforms for investment and securities trading; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for financial and monetary affairs; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for use in financial information, advisory, analysis, consultancy, research, and management; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for asset and portfolio management.
Interactive point of transaction devices are disclosed. A method may include: (1) detecting, by a computer program executed by an interactive point of transaction device, a biometric or a transaction device proximate to the interactive point of transaction device; (2) providing, by the computer program and on the interactive point of transaction device, instructions for presenting the biometric or the transaction device to a target sensor on the interactive point of transaction device; (3) providing, by the computer program, feedback on the presentation of the biometric or the transaction device to the target sensor on a display; (4) capturing, by the computer program and using the target sensor, information from the biometric or the transaction device; and (5) providing, by the computer program, instructions for removing the biometric or the transaction device from the interactive point of transaction device.
Aspects of the subject disclosure may include, for example, obtaining a model, obtaining input audio, processing the input audio to generate a transcript, obtaining at least one summary based on the transcript, identifying at least one error or inconsistency in the transcript or the at least one summary based on the model, and implementing, based on the identifying, a correction or a clarification in respect of the at least one error or inconsistency. Other aspects are disclosed.
Systems and methods for predicting recommendations using graph relationships are disclosed. According to an embodiment, a method may include: (1) monitoring, by a computer program, a messaging interface for transactions; (2) updating, by the computer program, a heterogeneous graph with data from the transactions, wherein the heterogeneous graph identifies a plurality of assets and a plurality of clients; (3) training, by the computer program, a graph model with the heterogeneous graph; (4) querying, by the computer program, the graph model with one of the plurality of assets, wherein the graph model returns a recommendation that identifies a subset of the plurality of clients for the asset; and (5) outputting, by the computer program, the recommendation.
Systems and methods for state machine driven programmable payments are disclosed. A method may include: defining a plurality of base state machines; storing definitions for the plurality of base state machines; receiving, via a user interface, a programmable payment instruction (“PPI”) from a user comprising a PPI definition of a PPI trigger, a PPI condition, and a PPI action; dynamically linking a state in one of the plurality of base state machines to the PPI definition; storing the PPI definitions; receiving a payment instruction; identifying, from the payment instruction, a base state machine and the PPI instruction linked to the payment instruction; creating a PPI-specific state machine definition for the PPI instruction linked to the payment instruction; and instantiating a PPI-specific state machine for the PPI-specific state machine definitions. The PPI-specific state machine calls one of the plurality of base state machines to execute portions of the payment instruction.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Financial affairs and monetary affairs, namely, financial information, management and analysis services; Financial advisory services rendered using artificial intelligence (AI); Information, advisory, consultancy and financial research services relating to finance and investments; Investment advisory services; Financial analysis and consultation; Investment consultation in the fields of securities investing and asset management; Providing financial services with respect to securities and other financial instruments and products, namely, trading of and investments in securities and financial instruments and products for others; Financial information provided by electronic means; Providing information and research in the field of finance and financial investments; Financial data analysis; Financial analysis, namely, compiling and analyzing statistics, data and other sources of information for financial purposes Providing on-line non-downloadable software using artificial intelligence (AI) for use in asset management; Providing temporary use of online non-downloadable chatbot software using artificial intelligence (AI) for investment portfolio management; Providing temporary use of on-line non-downloadable cloud computing software using artificial intelligence (AI) for use in selecting financial securities and financial assets; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for investment insights, portfolio management, and trading; Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for analyzing data and interacting with humans; Platform as a service (PAAS) featuring computer software platforms for use of artificial intelligence for natural language processing using generative pre-trained transformer (GPT) models in the field of financial services; Platform as a service (PAAS) featuring computer software platforms for analyzing and selecting securities tailored to customer; Platform as a service (PAAS) featuring computer software platforms for use in financial and monetary affairs; Platform as a service (PAAS) featuring computer software platforms for financial information, advisory, analysis, consultancy, research, and management; Platform as a service (PAAS) featuring computer software platforms for for asset and portfolio management; Platform as a service (PAAS) featuring computer software platforms for investment and securities trading; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for financial and monetary affairs; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for use in financial information, advisory, analysis, consultancy, research, and management; Software as a service (SAAS) services featuring software using artificial intelligence (AI) for asset and portfolio management
32.
METHOD AND SYSTEM FOR AUTOMATED SPECIALIZED DUE DILIGENCE FOR POLITICALLY EXPOSED PERSONS
A method and a system for automatically performing specialized due diligence for politically exposed persons in order to evaluate risk levels associated therewith are provided. The method includes: receiving a first data set that includes a name of a person and a list of positions associated with the person; extracting, from the first data set, first additional information that relates to the person; identifying, for each respective position included in the list of positions, a corresponding category from among a set of positional categories; retrieving, from at least one publicly accessible information source, second additional information that relates to the person; analyzing each of the first data set, the first additional information, and the second additional information in order to obtain answers to questions from among a predefined set of questions; and generating a due diligence report based on a result of the analysis.
In some aspects, the techniques described herein relate to a method including: receiving ambiguous data at an interface of a matching platform; persisting the ambiguous data to a receiving data store of a matching platform; providing the ambiguous data as input to a matching engine; matching, by the matching engine, the ambiguous data to data in a production data store; retrieving, by the matching engine, a source identifier associated with the data in the production data store; and providing the source identifier to a user device in operative communication with the matching platform.
Systems, methods, and devices for payment product verification and authorization using a customer identifier are disclosed. In some aspects, techniques described herein relate to receiving, by a payment product provider and from a payment processor, a customer identifier; querying a datastore of customers of the payment product provider with a parameterized query, where the customer identifier is a parameter of the query; determining, based on the query, that the customer identifier is associated with customer profile data of the payment product provider; determining payment product data associated with the customer profile data; returning, by the payment product provider and to the payment processor, a positive eligibility indication based on the customer profile data and the payment product data; receiving, by the payment product provider and from the payment processor, a customer approval indication; and sending, by the payment product provider and to the payment processor, the payment product data.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 30/0201 - Market modellingMarket analysisCollecting market data
G06Q 30/0207 - Discounts or incentives, e.g. coupons or rebates
35.
METHOD AND SYSTEM FOR VIRTUALLY TETHERING A PHYSICAL PRODUCT TO AN AUTHENTICATED PHYSICAL RECORD
A system for implementing a tool that virtually tethers a product to an authenticated physical record of the product. The system comprises a processor and memory that stores instructions that, when executed by a processor, cause the processor to perform operations. The operations may comprise: receiving a set of images of a first product; processing the set of images to determine a first set of attributes of the first product; determining whether the authenticated physical record comprises a description of the first set of attributes; and when a determination is made that the authenticated physical record comprises the description of the first set of attributes, utilizing the tool to virtually tether the first product to the authenticated physical record.
Systems and methods for eligibility-based interchange models are disclosed. According to an embodiment, a method for creating an eligibility-based interchange model may include: (1) ingesting, by an eligibility model computer program, interchange data from one or more sources source of interchange data; (2) generating, by the eligibility model computer program, an eligibility-based model using the ingested interchange data; (3) making available, by the eligibility model computer program, the eligibility-based model to a plurality of downstream systems; and (4) monitoring, by the eligibility model computer program, the one or more sources source of interchange data for updates to the interchange data.
A method and a system for dynamic request for quotation (RFQ) pricing using reinforcement learning and symbolic regression in order to obtain a pseudo-optimal nonlinear state-feedback controller for tracking a metric with increased interpretability are provided. The method includes: receiving bid price information and ask price information that relates to a financial instrument; selecting a metric to be used in conjunction with a determination of an RFQ price with respect to the financial instrument; formulating a Markov Decision Process (MDP) that relates to the determination of the RFQ price; using the MDP to define an RFQ pricing controller with respect to the metric; applying a reinforcement learning algorithm in order to tune a behavior of the RFQ pricing controller with respect to the metric; and using the RFQ pricing controller, the first information, and the second information to determine the RFQ price.
Methods and systems for generating, publishing, processing, and consuming linked data events and streams being shared by complex systems in order to construct a semantic web of the data and thereby form a consolidated coherent view of the data are provided. A method includes: receiving a set of metadata that relates to a set of events; generating, based on the metadata, an ordered node hierarchy map and a modern data event schema; receiving a set of tabular data; generating, based on the tabular data and the ordered node hierarchy map, the set of events; streaming the set of events over a streaming pipeline; processing the streamed set of events to generate a linked data media format; and outputting the linked data media format.
Systems and methods for providing firewalls and authenticators for smart terminals are disclosed. In one embodiment, a method may include: (1) receiving, by a smart terminal and from a browser, a browsing request to access a Uniform Resource Locator (URL) or an address for externally hosted content, wherein the smart terminal is prevented from directly accessing the URL or the address; (2) routing, by the smart terminal, the browsing request to a secure server; (3) checking, by the secure server, the URL or the address against an allowed list or a prohibited list; (4) directing, by the secure server, the browser to the URL or the address in response to the URL or the address being on the allowed list, or the URL or the address not being on the prohibited list; and (5) providing, by the secure server, a secure connection between the browser and the URL or the address.
A method for facilitating content lifecycle management via artificial intelligence for AI assisted authoring, AI assisted editing, and phased AI on AI recursive authoring and editing is disclosed. The method includes receiving, via an application programming interface, inquiries in a natural language format, each of the inquiries including freeform data; vectorizing the inquiries to generate numeric sequences; identifying, by using a model, topics for each of the inquiries based on the corresponding numeric sequences, each of the topics including a subject matter value and a sentiment value; aggregating information that corresponds to the topics from various sources, the sources including a preconfigured data lake; determining, by using the model, solutions in the natural language format for each of the inquiries based on the aggregated information, the solutions including recommended actions based on a predetermined setting; and generating, by using the model, a response that includes the solutions.
G06F 40/40 - Processing or translation of natural language
G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
Aspects of the subject disclosure may include, for example, receiving user inputs, including a portfolio market value, a portfolio growth rate, an SAA percentage, an allocation percentage for asset class(es), a number of future equal periodic capital commitments, and/or a timeframe for achieving the SAA percentage, obtaining projections for the asset class(es) based on an aggregated dataset relating to the asset class(es) and information regarding existing capital commitments in the asset class(es), determining values based on the user inputs and the projections, wherein the values include a proposed amount of each future equal periodic capital commitment, a projected timeframe for reaching the SAA percentage, proposed amounts of varying future capital commitments for individual periods in the timeframe, and/or a rate of change relating to the proposed amounts of varying future capital commitments, and deriving and presenting a portfolio plan using the values. Other embodiments are disclosed.
In some aspects, the techniques described herein relate to a method including: receiving, at a query platform, a query and a document identifier; determining, based on the document identifier, a document-type parameter; generating, based on metadata related to the document-type parameter, an optimized query; generating a query vector embedding from the optimized query; executing a lexical search on a document pool, wherein the lexical search is based on the optimized query, and wherein the lexical search returns a first document set; executing a contextual search on a vector database, wherein the contextual search is based on the query vector embedding and returns a second document set; and generating a targeted document set from the first document set and the second document set.
A method and a system for dynamic request for quotation (RFQ) pricing using proportional-integral-derivative (PID) control with Bayesian optimization in order to determine an optimal linear state-feedback controller for tracking a metric are provided. The method includes: receiving bid price information and ask price information that relates to a financial instrument; selecting a metric to be used in conjunction with a determination of an RFQ price with respect to the financial instrument; estimating an output of a PID controller based on a predetermined function of the metric; adjusting the estimate by using a Bayesian optimization process; and using the PID controller, the adjusted estimate, the bid price information, and the ask price information to determine the RFQ price.
Aspects of the subject disclosure may include, for example, obtaining a user query to access information from a group of knowledge graph databases, the user query corresponding to user-generated input, and identifying a group of terms within the user query that reduces a likelihood of identifying a match within the group of knowledge graph databases. Further embodiments can include adjusting the user query resulting in a first adjusted user query that enables identifying a knowledge graph database from the group of knowledge graph databases, identifying the knowledge graph database from the group of knowledge graph databases based on the first adjusted user query, and generating a first database query based on the first adjusted user query and the knowledge graph database, in which the first database query would have a computer-readable syntax compatible with the identified knowledge graph database. Other embodiments are disclosed.
In some aspects, the techniques described herein relate to a method including: receiving, at a data management platform, incoming data; writing the incoming data to a primary database cluster; executing an incremental backup operation, wherein the incremental backup operation generates an incremental backup of the primary database cluster; storing the incremental backup of the primary database cluster in a storage location; after a predetermined amount of time, executing an incremental restore operation on a delayed database cluster, wherein the incremental restore operation restores the incremental backup of the primary database cluster to the delayed database cluster; determining a data anomaly in the incoming data; and executing a failover command, wherein the failover command redirects database queries from the primary database cluster to the delayed database cluster.
G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
Banking and financial services; corporate responsibility initiatives in the field of philanthropy, namely, charitable services in the nature of providing grants that help to support small businesses and providing educational and skills training grants; providing a website featuring information in the field of banking and financial services. Providing a website featuring technology in the nature of an online portal that enables users to manage financial accounts, to access financial transaction histories and account information, to manage monetary payments and transfers, and to access fraud monitoring services; Software as a service (SAAS) services featuring software for managing financial investment portfolios; software as a service, offered via a website, for use in providing banking and financial services, namely, retail banking services, including digital wallet and electronic payment services, credit card services, investment services and lending services; software as a service, offered via a website, used by customers to facilitate account transactions, manage accounts and to obtain related financial information and advice; Temporary use of on-line non-downloadable computer software for use in providing financial services, namely, providing risk management, financial information, financial management, securities trading and investment management services; Platform as a service (PAAS) featuring computer software platforms for use in global payments; platform as a service (PAAS) featuring software platforms enabling customers to send and receive electronic payments; development of personalized and customizable payment platforms in multi currencies and languages, in the nature of online non-downloadable software for others.
36 - Financial, insurance and real estate services
42 - Scientific, technological and industrial services, research and design
Goods & Services
(1) Banking and financial services; corporate responsibility initiatives in the field of philanthropy, namely, charitable services in the nature of providing grants that help to support small businesses and providing educational and skills training grants; providing a website featuring information in the field of banking and financial services
(2) Providing a website featuring technology in the nature of an online portal that enables users to manage financial accounts, to access financial transaction histories and account information, to manage monetary payments and transfers, and to access fraud monitoring services; Software as a service (SAAS) services featuring software for managing financial investment portfolios; software as a service, offered via a website, for use in providing banking and financial services, namely, retail banking services, including digital wallet and electronic payment services, credit card services, investment services and lending services; software as a service, offered via a website, used by customers to facilitate account transactions, manage accounts and to obtain related financial information and advice; Temporary use of on-line non-downloadable computer software for use in providing financial services, namely, providing risk management, financial information, financial management, securities trading and investment management services; Platform as a service (PAAS) featuring computer software platforms for use in global payments; platform as a service (PAAS) featuring software platforms enabling customers to send and receive electronic payments; development of personalized and customizable payment platforms in multi currencies and languages, in the nature of online non-downloadable software for others
48.
SYSTEMS AND METHODS FOR DETECTING DATA DRIFT AND EXTRACTING DATA EXAMPLES AFFECTED BY DATA DRIFT
A method may include: (1) receiving reference data comprising input texts and corresponding labels; (2) training a covariate drift detector comprising a syntactic drift detector and a semantic draft detector with the reference data; (3) training a concept drift detector comprising a plurality of classifiers with the reference data; (4) receiving production data comprising a plurality of instances; (5) determining that the production data has drifted; (6) calculating similarity scores between each instance of the production data and the reference data; (7) detecting concept drift by generating a predictive distribution using the plurality of classifiers and calculating an entropy of the predictive distribution; (8) identifying final drifted instances from the covariate drifted instances and the concept drifted instances; and (9) receiving updated labels for the final drifted instances.
In some aspects, the techniques described herein relate to a method including: executing a first query, at a predefined time interval, against a target datastore for insight records related to an entity identifier; storing results of the first query as a record set, wherein the record set includes one or more existing insight records, and wherein each existing insight record includes connection information for connecting to a corresponding insight datastore; executing insight retrieval logic for each insight record in the record set, wherein the insight retrieval logic executes a second query against the corresponding insight datastore and retrieves a new insight value from the corresponding insight datastore; persisting the new insight value in a new insight record in the target datastore; and sending the new insight record as a communication to a recipient.
A method and a system for dynamic management of allocation of extensions that correspond to directory numbers for a smooth, efficient user experience and operational savings to the allocator is provided. The method includes: receiving, from a user via a user interface such as a telephone terminal, a connect request for an assignment of an extension; analyzing the connect request to determine characteristic traits associated with the user, such as a switch and a physical location; determining a set of available extensions that are assignable to the first user based on the characteristic traits; and assigning, to the user, an extension from within the set of available extensions that has not previously been assigned and that has been prechecked for validity and correct configuration. Upon assignment, the assigned extension is propagated to a ribbon of the user for subsequent usage without needing to reenter the number.
Systems and methods for approximation of Shapley values in memory-constrained environments are disclosed. According to an embodiment, a method may include: (1) receiving, by a training computer program executed on a training electronic device, a training dataset; (2) training, by the training computer program, a machine learning model on the training dataset; (3) deploying, by the training computer program, the machine learning model to a deployment electronic device; (4) receiving, by the deployment electronic device, an incoming data query; (5) generating, using the machine learning model, a prediction for the incoming data query; and (6) estimating, by a model explanation computer program, a Shapley value for the prediction.
Systems and methods for construction and retraining of decision trees ensemble using hybrid classical-quantum algorithms are disclosed. A method may include a classical computer program: receiving a dataset; calculating feature-weights for original examples using a feature-weight calculation method; updating the feature-weights for the original examples with feature-weights for the original examples and the new examples; loading the feature-weights for the dataset and new data into a first quantum-accessible data structure and loading overwritten values into a second quantum-accessible data structure; instructing a quantum computer to query quantum states for the first and second quantum-accessible data structures using random sampling with replacement, to execute quantum-supervised clustering with the quantum states and the feature-weights, to grow a depth for the tree, and to calculate labels for a regression task and/or a classification task; and receiving the labels from the quantum computer.
Aspects of the subject disclosure may include, for example, validating data across database tables by comparing checksums across rows of the various tables. A client computing device may perform a database query to produce checksum values for one or more rows in one or more database tables to be compared. Checksums are compared and when mismatches are found, database table rows may be copied from one database table to another, or entire database tables may be copied. Other embodiments are disclosed.
Systems and methods for digital identity and account abstraction are disclosed. A method may include: creating, by an application executed by a user electronic device in an off-chain environment, a user operation for a transaction based on an intention received from a user; receiving, by an entry point contract in an on-chain environment, the user operation with a verifiable credential for the user; validating, by the entry point contract, the user operation using a validation function in a smart contract wallet; determining, by the entry point contract, that there is a paymaster to sponsor the transaction; determining, by a paymaster contract for the paymaster, that the transaction should be sponsored based on the verifiable credential for the user; executing, by the entry point contract, the transaction using an arbitrary execution function in the smart contract wallet; and invoking, by the entry point contract, a post-operation that performs post-operation logic.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
57.
SYSTEMS AND METHODS FOR ENHANCED MOBILE DEVICE AUTHENTICATION
Systems and methods for enhanced mobile device authentication are disclosed. Systems and methods for enhanced mobile authentication are disclosed. In one embodiment, method for electronic device authentication may include (1) a server comprising at least one computer processor communicating a one-time passcode to an electronic device over a first communication channel; (2) the server receiving, from the electronic device over a second communication channel the one-time passcode encrypted with a private key associated with the electronic device; (3) the server decrypting the one-time passcode using a public key; (4) the server validating the one-time passcode; (5) the server generating a device identifier for the electronic device; and (6) the server persisting an association between the device identifier and the electronic device.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
A method may include: receiving a dataset comprising a plurality of label names and a label description for each label name; prompting a large language model (LLM) for initial annotation guidelines with the dataset; receiving, from the LLM, the initial annotation guidelines; receiving an unlabeled dataset comprising unlabeled text samples; predicting a label name for each unlabeled text sample; presenting each unlabeled text sample and its predicted label name for review; grouping incorrectly labeled text samples and their predicted label names; prompting the LLM for a recommendation to improve the initial annotation guidelines with the group of the incorrectly labeled text samples and their predicted label names and the initial annotation guidelines; receiving, from the LLM, the recommendation; prompting the LLM for improved annotation guidelines with the initial annotation guidelines and the recommendation; receiving the improved annotation guidelines; and deploying the improved annotation guidelines to a production environment.
G06F 40/169 - Annotation, e.g. comment data or footnotes
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
59.
SYSTEM AND METHOD FOR GENERATING BUDGETARY RECOMMENDATIONS FOR A USER-SELECTED TARGET ACTIVITY
A system and method for generating a budgetary recommendation for a user-selected target activity are disclosed. The method includes enabling a user to select a target activity from a plurality of activities. Next, the method includes receiving first information associated with a set of preferences that corresponds to the selected target activity. Next, the method includes retrieving second information associated with the selected target activity and the first information. Next, the method includes analyzing, using a recommendation engine, the first information and the second information to determine a budgetary allocation. Next, the method includes generating a preliminary budgetary recommendation based on the determined budgetary allocation. Next, the method includes rendering, via a display, the preliminary budgetary recommendation to receive a user input. Next, the method includes generating a final budgetary recommendation based on the user input received in response to the preliminary budgetary recommendation.
Various methods and processes, apparatuses/systems, and media for data processing are disclosed. A processor accesses a database that stores a plurality of historical data and input data corresponding to a derivative instrument; implements an artificial intelligence deep learning model; trains the artificial intelligence deep learning model with the historical data and the input data corresponding to the derivative instrument for time-series data prediction; learns, in response to training, volatility surface deformation data over time corresponding to the derivative instrument; calculates spot sensitivity data of the derivative instrument based on the volatility surface deformation data output from the artificial intelligence deep learning model; displays the spot sensitivity data onto a user interface; and receives user input via the user interface to conduct a transaction with respect to the derivative instrument.
A computing apparatus configured to implement travel control for a carriage of an automated cable runner (ACR) along the pathway of the ACR from a desired start point to a desired end point to deploy cabling into the tray from the start point to the end point, the computing apparatus includes a processor; a memory; and a communication interface coupled to each of the processor and the memory. The processor is configured to: receive a cabling deployment job request; and instruct a carriage with a cabling connected thereto via a cable holder to travel along the pathway from the start point to the end point to deploy the cabling in the tray to fulfill the cabling deployment job request.
H02G 1/08 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for laying cables, e.g. laying apparatus on vehicle through tubing or conduit, e.g. rod or draw wire for pushing or pulling
H02G 3/04 - Protective tubing or conduits, e.g. cable ladders or cable troughs
62.
SYSTEMS AND METHODS FOR IMPLEMENTING A QUANTUM-INSPIRED MAXIMUM INNER PRODUCT SEARCH
In some aspects, the techniques described herein relate to a method including: executing a data structure initialization process, wherein the data structure initialization process takes a real-valued array as input and creates a bag data structure for each vector in a set of vectors, and wherein the bag data structure for each vector in a set of vectors includes an index array and a probability array; providing, as input to a primary maximum inner product search process, the set of vectors, a stream of vectors, and the bag data structure for each of the vectors in the set; and determining, by a secondary maximum inner product search process for each vector in the stream of vectors, an index of the set of vectors such that the index has a maximum inner product with the vector from the stream of vectors.
A method for machine learning-based data matching and reconciliation may include: ingesting a plurality of records from a plurality of data sources; identifying company associated with each of the plurality of records; assigning a unique identifier to each uniquely identified company; matching each of the records to one of the uniquely identified companies using a trained company matching machine learning engine; identifying a primary company record in the matching records and associating other matching records with the primary company record; matching each of the records to a contact using a trained contact matching machine learning engine; identifying a primary contact record in the matching records and associating other matching records with the primary contact record; synchronizing the plurality of records in a graph database using the unique identifier; receiving feedback on the matching companies and/or matching contacts; and updating the trained company matching machine learning engine.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
64.
SYSTEMS AND METHODS FOR DETERMINING CAUSAL RELATIONSHIPS AMONG NETWORK ALARMS
In some aspects, the techniques described herein relate to a method including: receiving, at an alarm management service, a plurality of alarms, wherein each of the plurality of alarms includes respective alarm data; clustering the plurality of alarms into an alarm cluster group; generating a plurality of binary time sequences, wherein each of the plurality of binary time sequences corresponds to one of the plurality of alarms; generating an initial alarm graph based on the alarm cluster group and the plurality of binary time sequences; providing, as input to a causal inference process, the initial alarm graph and the plurality of binary time sequences; and generating, by the causal inference process, a causal alarm graph, wherein the causal alarm graph is a partially connected and directed graph.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
65.
System and method for separating or distributing database calls between active and passive databases
Various methods and processes, apparatuses/systems, and media for separating or distributing database calls between active and passive databases are disclosed. A processor establishes a communication link between a passive database and an active database via a communication network; executes real-time syncing of data between the active database and the passive database by implementing a replication algorithm; receives a request from an application user to generate a report corresponding to the application; implements a batch processor, at an application level, to separate read-only operations from read and write operations associated the application; and separates or distributes database calls, at the application level, between the active database and the passive database in a manner such that the read-only operations are directed to the passive database and the read and write operations are directed to the active database.
G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
66.
SYSTEMS AND METHODS FOR GENERATING DOCUMENT FORMATTING AND CONTENT USING GENERATIVE AI
Systems and methods for providing an archive of precedents are provided. The archive of precedents includes determining precedent data; parsing a new-event XML file for string data, wherein the string data is related to a new event; generating a vector embedding from the string data; determining a similar embedding in a vector space, wherein the similar embedding is a vector embedding of an instance of precedent data; parsing XML files of the precedent and new event and using parsed data to generate an old-to-new value map; retrieving the corresponding XML file and the corresponding precedent-event document associated with the vector embedding of the instance of precedent data; and providing, as input to a natural language processing model, the list of text strings recovered from the editable form of the document of the precedent event and the old-to-new value map.
Systems and methods for anomaly detection in software-defined networks from observed host metrics are disclosed. A method may include: (1) training a random forest model comprising a plurality of trees with historical metrics from a software defined network, the software defined network comprising a plurality of hosts; (2) receiving metrics for a plurality of features from the hosts in the software defined network; (3) providing the metrics to the trained random forest model; (4) receiving, from the trained random forest model, a prediction of an anomalous hosts for one of the hosts; (5) identifying a subset of the plurality of trees that contributed to the prediction; (6) generating feature scores for the feature from the subset of trees; (7) generating an anomaly score for the feature based on the feature scores and an explanation; and (8) executing an automated action in response to the anomaly score.
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
68.
SYSTEMS AND METHODS FOR LEARNING SYSTEM APPROACH TO ARTIFICIAL INTELLIGENCE MODELS
Systems and methods for learning system approach to artificial intelligence models are disclosed. A method may include: (1) receiving, by a computer program executed by an electronic device, a current artificial intelligence (AI) model; (2) providing, by the computer program, input data from a plant to the current AI model; (3) receiving, by the computer program, current AI model predictions from the current AI model; (4) receiving, by the computer program and from subject matter expert electronic device, feedback-based labels for the current AI model predictions; (5) determining, by the computer program, a prediction error between the current AI model predictions and the feedback-based label; and (6) applying, by the computer program, a model reference adaptive control algorithm to the current AI model in response to the prediction error being greater than a threshold.
Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
A method for providing a management framework for distributed event processing is disclosed. The method includes retrieving data from a distributed event streaming platform based on a data fetch size configuration, the data including event messages; submitting a batch of the data to a consumer thread based on a data polling configuration; loading the batch of the data onto a data structure that enables coordination of processing threads, the data structure including a blocking queue; processing each of the event messages in the batch of the data from the data structure based on predefined logics; publishing each of the processed event messages in the batch of the data to a producer buffer based on a selection logic, the producer buffer including a load balancer; and recording an agreement for each of the published event messages in the batch of the data to a shared collection.
In some aspects, the techniques described herein relate to a method including: receiving, at a rollup platform, a transaction request, wherein the transaction request includes an instructional parameter; generating, by the rollup platform, a transaction batch including the transaction request and other transaction requests, each having the same instructional parameter; executing, by a virtual machine of the rollup platform, the transaction batch, wherein the virtual machine is configured to execute a type of transaction indicated by the instructional parameter, and wherein executing the transaction batch generates a rollup block; generating, by the rollup platform, a validity proof for the rollup block; generating, by the rollup platform, a data package including the rollup block, the validity proof, and metadata, wherein the metadata indicates a batch type; and routing the data package to a destination chain based on the batch type for recordation on the destination chain.
In some aspects, the techniques described herein relate to a method including: generating, by a reinforcement learning engine, a plurality of user states within a simulated 3-dimensional environment; generating, by the reinforcement learning engine and for each of the plurality of user states, a plurality of movement actions, wherein each of the plurality of movement actions place a virtual content object in a corresponding position within the simulated 3-dimensional environment; generating, by the reinforcement learning engine and for each corresponding position of the virtual content object, a reward value, wherein the reward value reflects a relative utility of the corresponding position of the virtual content object; and updating, by the reinforcement learning engine, a placement policy based on the reward value for each corresponding position of the virtual content object.
A method may include: a broadcaster computer program generating, for participants in a network in a transaction, a commit, an audit token, and a proof of consistency; the broadcaster computer program broadcasting, the commits, the audit tokens, and the proofs of consistency for each participant to all participants in the network; the participant computer programs generating complimentary commits, complimentary audit tokens, complementary proofs of consistency, proofs of equivalency, and a proof of assets; the broadcaster computer program receiving from each of the participant computer programs, the proof of assets, the complimentary commit, the complimentary audit token, the complementary proof of consistency, and the proof of equivalency; the broadcaster computer program and/or the participant computer programs verifying, the proofs of assets, the proofs of balance, the proofs of consistency, and the proofs of equivalency; and the broadcaster computer program approving the transaction based on the verification.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
75.
METHOD AND SYSTEM FOR MIGRATING DATABASE CONTENT ONTO NEW DATABASE INFRASTRUCTURE
A system configured to: determine an optimal migration cache size; interface with a source database; index each respective entry from among the plurality of database record entries based on their respective database record entry dates; respectively prioritize each entry from among the plurality of database record entries for migration based on their plurality of respective database record entry dates and sizes; queue a queue of unmigrated database record entries for migration based on each respective prioritization; and initiate a migration of each respective entry from among the queue of unmigrated database record entries.
A method for payment device issuance, lifecycle management, and use may include a financial institution computer program: issuing a numberless, physical first financial instrument that is restricted to in-person transactions having a first primary account number (PAN) stored in a chip to a customer; issuing a digital, second financial instrument to an electronic wallet for the customer having a second PAN that is different from the first PAN; receiving a notification that the first financial instrument or the second financial instrument has been lost or compromised; in response to the first financial instrument being lost/compromised, reissuing the first financial instrument with a third PAN, wherein the second PAN for the second financial instrument is unchanged; and in response to the second financial instrument being lost/compromised, reissuing the second financial instrument with a fourth PAN, wherein the first PAN for the first financial instrument is unchanged.
Various methods and processes, apparatuses/systems, and media for constrained and loan pricing are disclosed. An optimization engine provides daily pricing vector for each loan pricing segment. The daily pricing output per segment (“vectors”) flows into an assessment process to determine a profit and loss (PnL) calculation and a constraints score. The resulting vectors (along with the PnL calculation and constraint scores) are stored in a tuple store. A processor updates surrogate parameters with new tuple store data points; evaluates an acquisition function on the surrogate parameters to find the next query subsidy vector; utilizes this expanded set of vectors and runs them back through the PnL calculation and generates constraint scores; and reports sufficiently subsidy vectors to a pricing team for final subsidy selection.
Provided is a system and method for reordering a heat map. A specific row or column of the heat map is selected by a user (a viewer of the heat map). The user also indicates that the map is to be sorted in ascending order or descending order of intensity according to a selected row or selected column. A revised heat map is constructed in video memory by first sorting the selected row (or selected column) in ascending or descending order by intensity. This generates a mapping order for application to cells in other rows (or columns). The other rows (or columns) are then re-ordered according to the mapping. The revised heat map is then presented via the display.
G06F 7/08 - Sorting, i.e. grouping record carriers in numerical or other ordered sequence according to the classification of at least some of the information they carry
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 40/177 - Editing, e.g. inserting or deleting of tablesEditing, e.g. inserting or deleting using ruled lines
79.
METHOD AND APPARATUS FOR TREATMENT OF USER TRAFFIC WITH MULTIPLE LAN SERVICES AND SINGLE CHARGING
Treatment of user traffic with multiple LAN Services and Single Charging. A network configuration for multiple N6/SGi LANs that are used to treat a given UE traffic. A system is configured for traffic routing and handling when a given session is to be treated by services offered in multiple N6-LANs. Load balancing for user traffic to different available servers if configured on N6 interface is provided. A health check mechanism of the available servers on the N6 interface is provided.
H04W 28/084 - Load balancing or load distribution among network function virtualisation [NFV] entitiesLoad balancing or load distribution among edge computing entities, e.g. multi-access edge computing
H04L 45/645 - Splitting route computation layer and forwarding layer, e.g. routing according to path computational element [PCE] or based on OpenFlow functionality
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable software; downloadable financial software; downloadable software, namely virtual currency, digital currency, digital tokens of value, and cryptocurrency; computer programs relating to financial matters; computer software platforms for financial and currency exchange; computer application software for blockchain based platforms; computer software for use in connection with digital currency and cryptocurrency; computer software and computer hardware for use as a cryptocurrency wallet; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable computer software for the handling of financial transactions; Downloadable computer programs for managing, verifying, initiating, receiving, and holding transactions and digital assets in financial matters; Downloadable financial exchange software; Downloadable currency exchange software; Downloadable currency trading software; Downloadable software for financial trading; Downloadable computer software for managing, initiating, receiving, and holding digital currency; Downloadable software for managing, initiating, receiving, and holding cryptocurrency; Downloadable software for the purchase, sale, trade, payment, clearing, and deposit of tokens of value.
81.
METHOD AND SYSTEM FOR IMPLEMENTING A VALUES-BASED DECISION-MAKING, DIAGNOSTICS AND REPORTING TOOL
A system for implementing a values-based decision-making, diagnostics, and reporting tool. The system may include a processor and memory that stores instructions that, when executed by the processor, cause the processor to perform operations. The operations may include: identifying at least one first source that provides client data that indicates at least one from among a client preference, a client behavior, and a client profile; obtaining the client data from the at least one first source; utilizing the client data to generate a set of personalized client values that indicates a set of values of a client; and utilizing the set of personalized client values to generate an values-based assessment for the client.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 40/06 - Asset managementFinancial planning or analysis
82.
METHOD AND SYSTEM FOR UTILIZING SYNTHETIC DATA IN ROBUST ADVERSARIAL TRAINING
Systems and methods for generating a distributionally robust counterpart for adversarial training of a machine learning model by adjusting an ambiguity set of the training data with respect to synthetic data are provided. The method includes: receiving a first dataset that includes data used for training a machine learning model, the first dataset having a first true distribution and a first empirical distribution; determining a first ambiguity set that relates to the first empirical distribution; obtaining a second dataset that includes synthetic data used for countering adversity with respect to the first dataset, the second dataset having a second true distribution and a second empirical distribution; determining a second ambiguity set that relates to the second empirical distribution; determining a third ambiguity set by obtaining an intersection between the first and second ambiguity sets; and training the machine learning model by using the third ambiguity set.
Aspects of the subject disclosure may include, for example, identifying source equipment is associated with a group of recipient equipment based on historical financial data, and determining a processing latency between the source equipment and each recipient equipment of the group of recipient equipment based on the historical financial data. Further embodiments can include determining a processing rate for each processing latency, and determining a verification latency to perform security authentication for each recipient equipment. Additional embodiments can include determining a verification rate for each verification latency, determining a service metric based on the processing rates and the verification rates, the service metric being associated with a token service that expediates a transfer of financial data between the source equipment and the group of recipient equipment, and presenting the service metric at the source equipment to enroll in the token service. Other embodiments are disclosed.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
84.
SYSTEMS AND METHODS FOR DOCUMENT PARTITIONING AND PARTITION LABELING
In some aspects, the techniques described herein relate to a method including: determining a first, a second, and a third logical partition separation indicator in a string file, wherein the first logical partition separation indicator is for a first partition level, the second partition separation indicator is for a second level, and the third logical partition separation indicator is also for the first partition level, each in a partition hierarchy; setting a first variable value to a value of the first logical partition separation indicator and a second variable value to a value of the second logical partition separation indicator; writing the first variable value to a data structure and writing the second variable value to the data structure; persisting the data structure to a search index; and clearing the first variable value and the second variable value.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
A method for using image analysis for time-series forecasting is provided. The method includes: receiving numeric time-series data; converting the numeric time-series data into an image, wherein the image is a time-frequency spectrogram; analyzing the image by applying a vision transformer encoder to the image to learn multi-modal data across time and frequency; forecasting, based on the analyzing of the image, at least one future time-series data point. The method further includes converting of the numeric time-series data into the image by applying a wavelet transform for convoluting wavelets at different scales with the numeric time-series data to calculate a respective signal strength for each of the wavelets and outputting the calculated respective signal strengths as the time-frequency spectrogram.
Aspects of the subject disclosure may include, for example, segregating unique combinations for a portfolio of items into partitions; routing the partitions to an optimization service platform comprising GPUs to apply, via parallel processing by the GPUs, an optimization allocation algorithm according to parameters and analyze each of the combinations of the partitions resulting in optimal outcomes for each of the partitions; and consolidating the optimal outcomes for each of the partitions to determine a suggested portfolio selected from the items. Other embodiments are disclosed.
A method for facilitating automated model evaluation based on question perturbations is disclosed. The method includes receiving, via an application programming interface, inputs that include an inquiry in a natural language format; generating, via a rephrasing model, questions based on the inquiry, each of the questions corresponding to a lexical variant of the inquiry; determine, via response models, an initial response for each of the questions and the inquiry; clustering the initial response for each of the questions and the inquiry into blocks based on shared characteristics; and computing metrics for each of the blocks.
Aspects of the subject disclosure may include, for example, receiving first user-generated input from a first communication device associated with a first user. The user-generated input comprises a prompt that indicates to generate computer code. Further embodiments can include searching a cache comprising a group of computer code based on the prompt, determining that there are no cache search results associated with the computer code in response to the searching of the cache, and generating the computer code utilizing an artificial intelligence software application. Other embodiments are disclosed.
A control system that provides for network-triggered relocation of a subset of active subscribers from one AMF to another AMF allowing for triggering a targeted AMF offload for a subset of active subscribers. The control system provides for indication of a target AMF to which a selected subscriber(s) shall be offloaded to by the source AMF utilizing a 5G-GUTI assigned to UE.
36 - Financial, insurance and real estate services
Goods & Services
(1) Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services.
91.
METHOD AND SYSTEM FOR PERFORMING AUTOMATIC SCHEMA-BASED DATA VALIDATION
A method and a system for performing schema-based data validation are disclosed. The method includes receiving a first dataset that comprises a plurality of entries, the first dataset is received from at least one data source. Next, the method includes receiving a second dataset that comprises a predefined set of instructions corresponding to a set of conformity standards for validation of the first dataset. Next, the method includes applying the predefined set of instructions to the received first dataset. Next, the method includes validating each of the plurality of entries of the first dataset based on the applying of the predefined set of instructions. Thereafter, the method includes generating a consolidated assessment report based on the validation, and displaying, using a display unit, the generated consolidated assessment report.
A method and system performing a method for managing dynamic messaging using a Kafka-based monitoring application deployed within a cloud environment having at least one software application in operation is provided. The Kafka-based monitoring application monitors consumer lag for a specific topic associated with the software application, schedules queries to detect consumer lag for the specific topic at predetermined intervals. detects, via an application programming interface in communication with the Kafka-based monitoring application, any consumer lag and retrieves a list of any affected consumers and associated consumer information; and determines one or more pools of the affected consumers, and performs a scaling operation to scale up or down consumers on the one or more pools based on the consumer lag detected.
H04L 41/5025 - Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
93.
Method and Apparatus to handle Partial Data Path Failure at User Plane
A telecommunications system and method for identifying when a next hop is down by sending a first series of pings from a User Plane (UP) computer to the next hop, for incrementing a Key Performance Indicator (KPI) to count a time for when the next hop is down, and for communicating from the UP computer to a Control Plane (CP) computer that a next hop is down. The system facilitating identification of when the next hop transitions to up by sending a second series of pings from the UP computer to the next hop, for incrementing the KPI at the time when the next hop is up, and for communicating from the UP computer to the CP computer that the next hop is up.
Various methods and processes, apparatuses/systems, and media for performing spatial-aware reading for visual documents are disclosed. A processor implements a language model; modifies existing parameters and architecture of the language model to incorporate new parameters in its architecture by integrating a disentangled spatial attention process to the language model; pretrains the modified model by performing an autoregressive block infilling process on a plurality of document pages thereby training the new parameters and further adjusting the existing parameters; instruction-tunes the pretrained model on data derived from a plurality of visually rich document understanding datasets to teach the pretrained model to follow document-oriented instructions or answer questions about documents by leveraging their content and their spatial layout and outputting a trained model; and performs spatial-aware reading for visual documents by utilizing the trained model.
In some aspects, the techniques described herein relate to a method including: receiving, at a query platform, a query text string; tokenizing, by the query platform, the query text string, wherein the tokenizing generates a query vector embedding; determining, by the query platform, a document vector embedding, wherein the document vector embedding is above a similarity threshold with respect to the query vector embedding; retrieving, by the query platform, textual document data related to the document vector embedding; sending, by the query platform, the query text string and the textual document data to a generative model engine; receiving, by the query platform and from the generative model engine, a natural language response to the query text string; and displaying, by the query platform, the natural language response via an interface.
A system and a method for authenticating user access to a service that is hosted on a public cloud platform are provided. The method includes: receiving an access request from a user that relates to a service that is hosted on a public cloud platform; preliminarily authenticating the access request by using a legacy authentication protocol that is not sufficiently secure for accessing the first service via the public cloud platform; generating and validating, based on a result of the preliminary authentication, a legacy protocol certification; retrieving roles that are associated with the user; obtaining, based on the user roles, a token that is usable for controlling access to the service via the public cloud platform; and augmenting the access request with the token and a signature to facilitate an authentication of the access request by the public cloud platform, while excluding the legacy protocol certification.
A system for predicting system component failures within a computer system that comprises a plurality of hardware components and a plurality of software components. The system may comprise memory storing instructions that, when executed, cause a processor to: obtain performance metrics by monitoring a network interface of the computer system; generate component failure probabilities by processing the performance metrics; determine that a first component failure probability among the component failure probabilities exceeds a risk threshold; determine remedial actions that mitigate a first component failure probability; and mitigate the first component failure probability by initiating an execution of the remedial actions.
36 - Financial, insurance and real estate services
Goods & Services
Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services
45 - Legal and security services; personal services for individuals.
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
Goods & Services
Concierge services for elite members comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs for elite members rendered together in an airport lounge; all the foregoing provided to credit card members Airport services, namely, transit lounge facilities for elite passenger relaxation featuring access to the Internet provided by others; providing transit lounge facilities for elite passenger relaxation featuring enhanced and expedited customer service responses for elite passengers; booking and arranging of access to airport lounges for elite passengers; airport services, namely, transit lounge facilities for elite passenger relaxation and also including shower facilities; all the foregoing provided to credit card members Providing premium food and beverage services for elite air travelers in transit lounges; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to elite air travelers in transit lounges; and providing conference and meeting room facilities for elite air travelers in transit lounges and airport terminals; all the foregoing provided to credit card members
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Airport services, namely, transit lounge facilities for elite passenger relaxation featuring access to the Internet provided by others; providing transit lounge facilities for elite passenger relaxation featuring enhanced and expedited customer service responses for elite passengers; booking and arranging of access to airport lounges for elite passengers; airport services, namely, transit lounge facilities for elite passenger relaxation and also including shower facilities; all the foregoing provided to credit card members
(2) Providing premium food and beverage services for elite air travelers in transit lounges; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to elite air travelers in transit lounges; and providing conference and meeting room facilities for elite air travelers in transit lounges and airport terminals; all the foregoing provided to credit card members
(3) Concierge services for elite members comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs for elite members rendered together in an airport lounge; all the foregoing provided to credit card members